Mirko Zorz

New infosec products of the week: October 16, 2020
Cyborg Security launches HUNTR platform to help orgs tackle cyber threats Cyborg Security’s HUNTR platform provides advanced and contextualized threat hunting and detection …

GitHub envisions a world with fewer software vulnerabilities
After five months in beta, the GitHub Code Scanning security feature has been made generally available to all users: for free for public repositories, as a paid option for …

New infosec products of the week: October 9, 2020
Checkmarx provides automated security scans within GitHub repositories Checkmarx announced a new GitHub Action to bring comprehensive, automated static and open source …

How do I select a data storage solution for my business?
We live in the age of data. We are constantly producing it, analyzing it, figuring out how to store and protect it, and, hopefully, using it to refine business practices. …

New infosec products of the week: October 2, 2020
Cohesity SiteContinuity: Protecting business-critical apps across a single platform Cohesity SiteContinuity is an automated disaster recovery solution that is integrated with …

Hardware security: Emerging attacks and protection mechanisms
Maggie Jauregui’s introduction to hardware security is a fun story: she figured out how to spark, smoke, and permanently disable GFCI (Ground Fault Circuit Interrupter – …

Plan for change but don’t leave security behind
COVID-19 has upended the way we do all things. In this interview, Mike Bursell, Chief Security Architect at Red Hat, shares his view of which IT security changes are ongoing …

How do I select a remote workforce protection solution for my business?
Recent research shows almost three quarters of large businesses believe remote working policies introduced to help stop the spread of COVID-19 are making their companies more …

Qualys Multi-Vector EDR: Protection across the entire threat lifecycle
Traditional endpoint detection and response (EDR) solutions focus only on endpoint activity to detect attacks. As a result, they lack the context to analyze attacks …

How do I select a password management solution for my business?
91 percent of people know that using the same password on multiple accounts is a security risk, yet 66 percent continue to use the same password anyway. IT security …

ERP security: Dispelling common misconceptions
Enterprise resource planning (ERP) systems are an indispensable tool for most businesses. They allow them to track business resources and commitments in real time and to …

New infosec products of the week: August 21, 2020
Kali Linux 2020.3 released: A new shell and a Bluetooth Arsenal for NetHunter Offensive Security has released Kali Linux 2020.3, the latest iteration of the popular open …
Featured news
Resources
Don't miss
- Avoiding vendor lock-in when using managed cloud security services
- The CISO’s dilemma of protecting the enterprise while driving innovation
- PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)
- Account takeover detection: There’s no single tell
- Man vs. machine: Striking the perfect balance in threat intelligence